Showing 937–948 of 4482 results

Configuring Network Storage Solutions with RHEL
Huge amounts of RAM and CPU won't do us much good if there's no Storage to hold our data, or Networking to access our data stores. In this course, we will harness the power of Open Source to create efficient solutions to enterprise storage problems.

Configuring Prometheus 2 to Collect Metrics
Correctly configuring Prometheus to collect metrics is key to getting the most from your monitoring. This course will teach you how to configure and debug metric collection in Prometheus.

Configuring Security Headers in ASP.NET 4 and ASP.NET Core 3 Applications
After watching this course you'll have the knowledge and skills to mitigate common browser attacks by setting HTTP headers. The code samples are in ASP.NET Core and ASP.NET for .NET Framework.

Configuring Security Services and Policies in Microsoft Azure
Securing the cloud effectively is a daunting challenge. Microsoft Azure has native tools to improve your security posture. In this course, you'll learn about Azure Security Center, Policies, and Monitor to improve the security of your environment.

Configuring Service Applications in SharePoint 2016
Service applications are a necessary part of every SharePoint farm. This course will explain how they work, what they do, and how to create the majority of the core service applications required in SharePoint 2016.

Configuring SharePoint 2016 Workloads
Implementing SharePoint 2016, though a fairly easy task, does require a deeper understanding of features and workloads. SharePoint supports Social, Enterprise and Web Content Management. Knowing how to implement them is key to it being successful

Configuring Storage in OpenShift
This course will teach you how to configure and provision storage in a Red Hat OpenShift Cluster to be used by your containerized applications.

Configuring the User Profile Service Application in SharePoint 2016
This course will teach you how to create the User Profile Service Application and synchronize user profile information from Active Directory using either AD Import, or Microsoft identity Manager with SharePoint 2016.

Configuring Threat Intelligence in Splunk Enterprise Security
Splunk Enterprise Security is a premium application used within the Splunk deployment to help with SOC operations. This course will teach you how to configure various threat intelligence sources for use within Splunk Enterprise Security.

Configuring Windows 10/11 Connectivity and Storage
Data can move around in networks, or stay in place on storage devices. Desktop admins have to manage both situations, and that’s what this course explores, including details on IP configuration, mobile networking, NTFS permissions, and OneDrive.

Configuring Windows Firewall for Windows Server 2019
Controlling and securing traffic to and from Windows Server 2019 hosts enhances your organization's security posture. Windows Defender Firewall is included with Windows Server 2019 and can be managed using GUI tools as well as PowerShell cmdlets.

Confluence Cloud: Site Administration
Learn to set up, configure, and customize Confluence Cloud. Manage its users, groups, permissions, and integrate with external identity providers. Also, learn to administer apps, blueprints, templates, and to migrate from on-premise to the cloud.